Damgård, I. B., Ravi, D.
, Roy, L. D., Tschudi, D. & Yakoubov, S. (2025).
Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity. In E. Boyle, E. Boyle & M. Mahmoody (Eds.),
Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings (pp. 266–292). Springer.
https://doi.org/10.1007/978-3-031-78023-3_9
Ganesh, C.
, Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D. (2025).
Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model).
Journal of Cryptology,
38(1), Article 11.
https://doi.org/10.1007/s00145-024-09525-2
Baum, C., Beullens, W., Mukherjee, S., Orsini, E., Ramacher, S., Rechberger, C.
, Roy, L. & Scholl, P. (2025).
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures. In K.-M. Chung & Y. Sasaki (Eds.),
Advances in Cryptology - ASIACRYPT 2024 (pp. 463-493). Springer Nature.
https://doi.org/10.1007/978-981-96-0875-1_15
Årdal, M. A., Adj, G., Alblooshi, A.
, Aranha, D. F., A. Canales-Martínez, I., Chavez-Saab, J., Gazzoni Filho, D. L., Reijnders, K. & Rodriguez-Henriquez, F. (2025).
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4.
IACR Transactions of Cryptographic Hardware and Embedded Systems,
2025(1), 497-522.
https://doi.org/10.46586/tches.v2025.i1.497-522
Aardal, M. A., Adj, G.
, F. Aranha, D., Basso, A., Canales Martínez, I. A., Chávez-Saab, J., Corte-Real Santos, M., Dartois, P., De Feo, L., Duparc, M., Komada Eriksen, J., Fouotsa, T. B., Filho, D. L. G., Hess, B., Kohel, D., Leroux, A., Longa, P., Maino, L., Meyer, M. ... Wesolowski, B. (2025).
SQIsign 2.0: Algorithm specifications and supporting documentation.
https://sqisign.org/spec/sqisign-20250205.pdf
Årdal, M. A., Aranha, D. F., Boudgoust, K., Kolby, S. & Takahashi, A. (2024).
Aggregating Falcon Signatures with LaBRADOR. In L. Reyzin & D. Stebila (Eds.),
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings (pp. 71-106)
https://doi.org/10.1007/978-3-031-68376-3_3
Braun, L., Castagnos, G.
, Damgård, I. B., Laguillaumie, F.
, Melissaris, K., Orlandi, C. & Tucker, I. (2024).
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups.
https://eprint.iacr.org/2024/717
Braun, L., Castagnos, G.
, Damgård, I., Laguillaumie, F.
, Melissaris, K., Orlandi, C. & Tucker, I. (2024).
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. In C. Galdi & D. H. Phan (Eds.),
Security and Cryptography for Networks - 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II (pp. 24-46). Springer.
https://doi.org/10.1007/978-3-031-71073-5_2
Hansen, B., Aamand, J.
, Blicher-Mathiesen, G., Christiansen, A. V., Claes, N., Dalgaard, T., Frederiksen, R. R., Jacobsen, B. H., Jakobsen, R.
, Kallesøe, A., Kim, H., Koch, J., Møller, I., Madsen, R. B.
, Schaper, S., Sandersen, P. B. E., Voutchkova, D. D. & Wiborg, I. (2024).
Assessing groundwater denitrification spatially is the key to targeted agricultural nitrogen regulation.
Scientific Reports,
14(1), Article 5538.
https://doi.org/10.1038/s41598-024-55984-9
Damgård, I., Keller, H., Nelson, B., Orlandi, C. & Pagh, R. (2024).
Differentially Private Selection from Secure Distributed Computing. In T.-S. Chua, C.-W. Ngo, R. Kumar, H. W. Lauw & R. K.-W. Lee (Eds.),
WWW 2024 - Proceedings of the ACM Web Conference (pp. 1103-1114). Association for Computing Machinery.
https://doi.org/10.1145/3589334.3645435
Brzuska, C., Couteau, G., Egger, C., Karanko, P.
& Meyer, P. E. (2024).
Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs. In C. Galdi & D. Hieu Phan (Eds.),
Security and Cryptography for Networks (pp. 97–116). Springer Nature.
https://eprint.iacr.org/2023/1145
Burkhardt, J., Caragiannis, I., Fehrs, K., Russo, M.
, Schwiegelshohn, C. & Shyam, S. (2024).
Low-Distortion Clustering with Ordinal and Limited Cardinal Information. In M. Wooldridge, J. Dy & S. Natarajan (Eds.),
Technical Tracks 14 (9 ed., pp. 9555-9563). Association for the Advancement of Artificial Intelligence.
https://doi.org/10.1609/aaai.v38i9.28811
Melissaris Papanikolaou, N., Ravi, D.
& Yakoubov, S. (2024).
Threshold-Optimal MPC With Friends and Foes. In A. Chattopadhyay, S. Bhasin, S. Picek & C. Rebeiro (Eds.),
Progress in Cryptology – INDOCRYPT 2023: 24th International Conference on Cryptology in India, Goa, India, December 10–13, 2023, Proceedings, Part II (Vol. 2, pp. 3-24). Springer.
https://doi.org/10.1007/978-3-031-56235-8_1
Roy, L. & Xu, J. (2023).
A Universally Composable PAKE with Zero Communication Cost: (And Why It Shouldn’t Be Considered UC-Secure). In A. Boldyreva & V. Kolesnikov (Eds.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (pp. 714-743). Springer.
https://doi.org/10.1007/978-3-031-31368-4_25
Ciampi, M.
, Damgård, I., Ravi, D., Siniscalchi, L., Xia, Y.
& Yakoubov, S. (2023).
Broadcast-Optimal Four-Round MPC in the Plain Model. In G. Rothblum & H. Wee (Eds.),
Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II (pp. 3-32). Springer.
https://doi.org/10.1007/978-3-031-48618-0_1
Damgård, I., Ravi, D., Siniscalchi, L. & Yakoubov, S. (2023).
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels. In A. Aly & M. Tibouchi (Eds.),
Progress in Cryptology – LATINCRYPT 2023: 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings (pp. 87-106). Springer.
https://doi.org/10.1007/978-3-031-44469-2_5
Baum, C., David, B., Dowsley, R., Kishore, R.
, Nielsen, J. B. & Oechsner, S. (2023).
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time. In A. Boldyreva & V. Kolesnikov (Eds.),
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (Vol. 1, pp. 439-470). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-031-31368-4_16
Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V. (2023).
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages. Paper presented at Theory of Cryptography. TCC 2023, Taipei, Taiwan.